http://www.w5j6stm77zs6652pgsij4awcjeel3eco7kvipheu6mtr623eyyehj4yd.onion/w/index.php?title=Cold_Boot_Attack_Defense
Notably, cold boot attacks have proven effective against Trusted Platform Modules (TPMs) , as well as full disk encryption regardless of the vendor or operating system. For certain memory modules, the time window for an attack can be extended to several hours by cooling them with a refrigerant. [ 3 ] Using TPM transparent encryption opens the risk for "Warm" Cold Boot Attacks, see chapter TPM .